Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 13:25
Behavioral task
behavioral1
Sample
30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe
Resource
win7-20240729-en
5 signatures
150 seconds
General
-
Target
30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe
-
Size
33KB
-
MD5
30164d8e44d2a77ce0650155f1f1d01c
-
SHA1
b9083598e48f552512b1ecd40e0a7a6ce220d921
-
SHA256
e98c18286f8e052ff514f5e4567f026171a480e4a6cc28cbf4ca7f9a3536067c
-
SHA512
fc83aa13bc9d2097fd591bf7344fda93125ddf13fc9e65f2eb38fa37dad80894e63d114f24774516fa917c5d1b9e6cb229d2c0453ccd62aa2b8d1cf14d00efe3
-
SSDEEP
384:q9FJ6xvBWCF+eARbepVI5I6uQ86K39DOLIG5pXaQPFtNat8adUJQbSWrdf768QuR:q9FJ610eAJepVe/86K3VoFPYNGyX7M2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5028-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/5028-3-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/5028-10-0x0000000000400000-0x0000000000418000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5028 30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30164d8e44d2a77ce0650155f1f1d01c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028